You are on page 1of 19

m CISCO·s Tele-presence

ô IT·s    
     - Sixth
Sense Technology
m mirst introduced in October 2006, is a product
developed by Cisco Systems which provides
high-definition 1080p video.

m Spatial audio, and a setup designed to link two


physically separated rooms so they resemble a
single conference room even though the two
rooms may be on opposite sides of the world.
m Cisco has sold about 2,000 rooms, with about
another 250 units installed.
m A non-revenue unit is Installed at Taj Hotel, umbai
By CISCO.
m Units Under Construction at Bangalore, Delhi,
Kolkata.
m About Pranav istry:
Born at Palanpur, a small town of northern Gujarat, India.
He·s graduated as asters of Design from IIT Bombay and
asters of edia Arts and Sciences from IT edia Lab, US.
He has completed bachelors degree in Computer Science &
Engineering. Before joining edia Lab, he was working with
icrosoft as a UX Researcher.
At present, He·s Pursuing PhD in mluid Interfaces & is
Researcher at IT edia Lab.
º The SixthSense prototype design which is
comprised of a pocket projector, a mirror
and a camera. The hardware components
are assembled in like mobile wearable
device. Both the projector and the camera
are connected to the mobile computing
device in the user·s pocket.(Smartphone)
º It bridges this gap, bringing intangible,
digital information out into the tangible
world, and allowing us to interact with this
information via natural hand gestures.
º¶SixthSense· frees information from its
confines by seamlessly integrates it with real
World, and thus making the entire world
your computer at your minger Tip.
º This arrangement of Components
consists of a High Definition camera,
Color arkers, a projector, and other
Essential Components.
ºThe drawing application lets the user
draw on any surface by tracking the
fingertip movements of the user·s index
finger.
º SixthSense also recognizes user·s
freehand gestures (postures).
  uT I AL
.
rt i i t r li it m r ls r
t ri i l s f m r lity; rt i i t
ri t r i t.
.
i i r it t r l s r
st r s f r ri t t r r ti ,
s .t st r s f r f ssi :
It s t si r t i lf r
ysi i s t v rtis .
ºA it t is t r r y, s i lly i
m ti sl , r it r f rs t t i l
k r r tr ti t st r f s s
s ri r t ti IT syst ms.

º it t
k rs r m t rs rity x rts,
si liz i tr ti t sti , t r
t sti m t l i s, t s r t t m y's
i f rm ti syst ms r s r .

ºI t m t rs rity r f ssi ls
r ki i t t m t r syst ms. N it r
m t t r t syst ms r st l i f rm ti .

ºuv l t t r t syst ms s rity r rt k


t rs tt v l r iliti s f .
1: Download OPHCRACK ² Linux Software

2: It will be a .ISO image file

3: Burn the .ISO with ERO

4: Restart the System who·s Username &


password is to be known

5:let the OPHCRACK run itself.

6: You will see the system user·s list with their


Respective Username & Passwords.
A survey from the ASSCO that 1,80,000 people required
every month, who can work on ´Cyber Securityµ &
this ratio is rising up day by day.
In today·s Computer odernization, where all the Law-Enforcement
agencies, Corporate, Govt. Bodies, Academia, Individuals & other
sectors are getting depended on computers & internet;
it becomes very crucial for every sector to secure its Confidential
Data/Information from the professional crackers. oreover, as our
society is getting dependent on all the Electronic Transactions like, E-
Shopping, E-Banking, E-Commerce, E-Ticketing, E-Gaming etc,.

The ¶Cyber Crime· on another side is also rising up day by day and on
the basis of this the new concept of ´Cyber Securityµ comes up into
the picture and its also in Boom.

Apart from this, it is our duty to start working for our ation by
learning this new Technology to provide Optimum Security with lots of
Ethics, because every now and then we get to know about different
Cyber Attacks from other countries like Russia, Saudi-Arabia, and U.S.
as they are very good in this Technology, and if we talk about our
country, Indians are nowhere in this list.
 I t r tS rity
 t S rity
N t rk S rity
 I f rm ti S rity
Q tit tiv M s r s S rity
 N t rk s rity s m v ry l rt i .

 A sim l l s r s t k y r ´N t rk
s rityµ s . milli it ms N v m r, .

 N t rk s rity ims t r t tt tir i fr str t r f


m t r t rk its rr s i s rvi s fr m
t riz ss.

 T t k y l m ts f t rk s rity r risk

ss ssm t risk m m t.
(1) Security Consists of hardware and software
based
firewalls and physical security approaches,

(2) Security polices, which include security


protocols, users· authentications, authorizations,
access controls, information integrity
and confidentiality,

(3) Detection of malicious programs, including


anti-viruses, worms, or
Trojan horses, and spyware or malwares.

(4) Intrusion detection and prevention, which


encompasses network traffic surveillance and
analyzing and profiling user behavior.
ô Indication of Virus Attacks
1. Programs take longer time to load than ormal
2. Operating System becomes Slow

ô Securing Laptops, otebooks, I-pads.etc


1. Use Strong Passwords
2. Laptop Thefts
3. mingerprint Reader
4. Laptop Locks
5. Switch of Bluetooth & Wireless Security
6. BIOS Passwords
1. Establish Strong Passwords

2. Put up Strong mirewall

3. Install Antivirus Software

4. Update your Antivirus weekly.

5. Update your Operating System

6. Update your Programs Regularly

7. Secure Your Hand-held Devices(


Smartphone's, PDA·s)

8. Backup Your Data Regularly Be Careful with


Push e-mail·s, While Surfing Webs.
î. ut i l ki ux rt.
. S rity A mi istr t r.
. tr ti T st r.
. S rity A it r.
. S rity s lt t.
. y r rim I v sti t r.
. S rity r f ssi l
. y rS rity ux rt.
9. y r m r si ux rt.
î. I.T S rity M r.
mor ore Details Contact us at :

ë  

Thakkers ajesty, Above S.K
Rainbow lab,
College Road, asik.

You might also like